Skip to main content
Top

2016 | OriginalPaper | Chapter

An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT

Authors : Jing Wang, Zhenghui Liu, Junjie He, Chuanda Qi

Published in: Digital-Forensics and Watermarking

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A tamper recovery scheme for speech signal based on digital watermark is proposed. In this paper, a compression method based on discrete wavelet transform is discussed, and one block-based embedding method for speech signal is explored. Firstly, speech signal is framed, scrambled and segmented. Secondly, frame number is embedded into the first two segments. The compressed signal of each frame after being scrambled is embedded into other two segments by using the block-based method. Attacked frames can be located by frame number. If watermarked speech is attacked, compressed signals are extracted to perform tamper recovery. Performance analyses indicate that the scheme proposed not only improves the accuracy of tamper localization and the security, but also has the ability of tamper recovery.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pun, C.M., Yuan, X.C.: Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans. Audio Speech Lang. Process. 21(11), 2412–2424 (2013)CrossRef Pun, C.M., Yuan, X.C.: Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans. Audio Speech Lang. Process. 21(11), 2412–2424 (2013)CrossRef
2.
go back to reference Peng, H., Li, B., Luo, X.H.: A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit. Sig. Proc. 23(1), 382–389 (2013)MathSciNetCrossRef Peng, H., Li, B., Luo, X.H.: A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit. Sig. Proc. 23(1), 382–389 (2013)MathSciNetCrossRef
3.
go back to reference Lei, B., Soon, I.Y., Tan, E.L.: Robust SVD-based audio watermarking scheme with differential evolution optimization. IEEE Trans. Audio Speech Lang. Process. 21(11), 2368–2378 (2013)CrossRef Lei, B., Soon, I.Y., Tan, E.L.: Robust SVD-based audio watermarking scheme with differential evolution optimization. IEEE Trans. Audio Speech Lang. Process. 21(11), 2368–2378 (2013)CrossRef
4.
go back to reference Akhaee, M.A., Kalantari, N.K., Marvasti, F.: Robust audio and speech satermarking using Gaussian and Laplacian modeling. Sig. Process. 90(8), 2487–2497 (2010)CrossRefMATH Akhaee, M.A., Kalantari, N.K., Marvasti, F.: Robust audio and speech satermarking using Gaussian and Laplacian modeling. Sig. Process. 90(8), 2487–2497 (2010)CrossRefMATH
5.
go back to reference Herbig, T., Gerl, F., Minker, W.: Self-learning speaker identification for enhanced speech recognition. Comput. Speech Lang. 26(3), 210–227 (2012)CrossRef Herbig, T., Gerl, F., Minker, W.: Self-learning speaker identification for enhanced speech recognition. Comput. Speech Lang. 26(3), 210–227 (2012)CrossRef
6.
go back to reference Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker recognition from encrypted VoIP communications. Digital Invest. 7(1–2), 65–73 (2010)CrossRef Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker recognition from encrypted VoIP communications. Digital Invest. 7(1–2), 65–73 (2010)CrossRef
7.
go back to reference Navarathna, R., Dean, D., Sridharan, S.: Multiple cameras for audio-visual speech recognition in an automotive environment. Comput. Speech Lang. 27(4), 911–927 (2013)CrossRef Navarathna, R., Dean, D., Sridharan, S.: Multiple cameras for audio-visual speech recognition in an automotive environment. Comput. Speech Lang. 27(4), 911–927 (2013)CrossRef
8.
go back to reference Sahidullah, M., Saha, G.: Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Commun. 54(4), 543–565 (2012)CrossRef Sahidullah, M., Saha, G.: Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Commun. 54(4), 543–565 (2012)CrossRef
9.
go back to reference Park, C., Thapa, M.D., Wang, G.N.: Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn. Lett. 28(8), 931–938 (2007)CrossRef Park, C., Thapa, M.D., Wang, G.N.: Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn. Lett. 28(8), 931–938 (2007)CrossRef
10.
go back to reference Chen, O.T.C., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605–1616 (2007)CrossRef Chen, O.T.C., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605–1616 (2007)CrossRef
11.
go back to reference Yuan, S., Huss, S.A.: Audio watermarking algorithm for real-time speech integrity and authentication. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 220–226 (2004) Yuan, S., Huss, S.A.: Audio watermarking algorithm for real-time speech integrity and authentication. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 220–226 (2004)
12.
go back to reference Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578–584 (2010)CrossRefMATH Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578–584 (2010)CrossRefMATH
13.
go back to reference Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRefMATH Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRefMATH
14.
go back to reference Li, C.L., Wang, Y.H., Ma, B., Zhang, Z.X.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stan. Interfaces 34(4), 367–379 (2012)CrossRef Li, C.L., Wang, Y.H., Ma, B., Zhang, Z.X.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stan. Interfaces 34(4), 367–379 (2012)CrossRef
15.
go back to reference Roldan, L.R., Hernandez, M.C., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Watermarking-based image authentication with recovery capability using halftoning technique. Sig. Process. Image Commun. 28(1), 69–83 (2013)CrossRef Roldan, L.R., Hernandez, M.C., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Watermarking-based image authentication with recovery capability using halftoning technique. Sig. Process. Image Commun. 28(1), 69–83 (2013)CrossRef
16.
go back to reference Fakhr, M.W.: Sparse watermark embedding and recovery using compressed sensing framework for audio signals. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, pp. 535–539 (2012) Fakhr, M.W.: Sparse watermark embedding and recovery using compressed sensing framework for audio signals. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, pp. 535–539 (2012)
17.
go back to reference Vivekananda, B.K., Indranil, S., Abhijit, D.: A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Sig. Process. 30(5), 915–927 (2011)CrossRef Vivekananda, B.K., Indranil, S., Abhijit, D.: A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Sig. Process. 30(5), 915–927 (2011)CrossRef
18.
go back to reference Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973–1984 (2011)CrossRefMATH Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973–1984 (2011)CrossRefMATH
19.
go back to reference Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput. Electr. Eng. 37(4), 425–443 (2011)MathSciNetCrossRefMATH Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput. Electr. Eng. 37(4), 425–443 (2011)MathSciNetCrossRefMATH
20.
go back to reference Liu, Z.H., Wang, H.X.: A novel speech content authentication algorithm based on Bessel-Fourier moments. Digital Sig. Process. 24, 197–208 (2014)MathSciNetCrossRef Liu, Z.H., Wang, H.X.: A novel speech content authentication algorithm based on Bessel-Fourier moments. Digital Sig. Process. 24, 197–208 (2014)MathSciNetCrossRef
21.
go back to reference Wang, Y., Wu, S.Q., Huang, J.W.: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J. Adv. Sig. Process. 2010(13), 1–17 (2010)MATH Wang, Y., Wu, S.Q., Huang, J.W.: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J. Adv. Sig. Process. 2010(13), 1–17 (2010)MATH
Metadata
Title
An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT
Authors
Jing Wang
Zhenghui Liu
Junjie He
Chuanda Qi
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-31960-5_17

Premium Partner